1 |
Threats to Bitcoin SoftwareKateraas, Christian H January 2014 (has links)
Collect and analyse threat models to the Bitcoin ecosystem and its software. The create misuse case, attack trees, and sequence diagrams of the threats. Create a malicious client from the gathered threat models. Once the development of the client is complete, test the client and evaluate its performance. From this, assess the security of the Bitcoin software.
|
Page generated in 0.017 seconds